Skip to content

Commit 389b52a

Browse files
committed
edits
1 parent e0c80f6 commit 389b52a

File tree

8 files changed

+22
-20
lines changed

8 files changed

+22
-20
lines changed

learn-pr/azure/cloud-adoption-framework-security/includes/1-introduction.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,4 +1,4 @@
1-
The Secure methodology in Cloud Adoption Framework for Azure provides a structured approach to help secure your Azure cloud estate.
1+
The Secure methodology in the Cloud Adoption Framework provides a structured approach to help secure your Azure cloud estate.
22

33
The guidance in this module provides recommendations that are relevant to all methodologies within the Cloud Adoption Framework. You should incorporate security measures in every phase of your cloud adoption journey.
44

learn-pr/azure/cloud-adoption-framework-security/includes/2-methodology.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -6,8 +6,8 @@ This Secure methodology guidance is one component of a larger holistic set of Mi
66

77
- [The Azure Well-Architected Framework](/azure/well-architected/security/) provides security best practices for application development and DevOps and DevSecOps processes.
88

9-
- [The Microsoft Cloud Security Benchmark](/security/benchmark/azure/) provides best practices for stakeholders. It includes security baselines that describe the available security features and recommended optimal configurations for Azure services.
10-
- [Zero Trust guidance](/security/zero-trust/) provides guidance for security teams. It describes how to implement technical capabilities that support a Zero Trust modernization initiative.
9+
- [The Microsoft cloud security benchmark](/security/benchmark/azure/) provides best practices for stakeholders. It includes security baselines that describe the available security features and recommended optimal configurations for Azure services.
10+
- [Zero Trust documentation](/security/zero-trust/) provides guidance for security teams. It describes how to implement technical capabilities that support a Zero Trust modernization initiative.
1111

1212
## Modernize your security posture
1313

learn-pr/azure/cloud-adoption-framework-security/includes/5-plan.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -28,7 +28,7 @@ Incorporate Zero Trust principles to structure phases and steps for teams. The M
2828

2929
- [Infrastructure](/security/zero-trust/deploy/infrastructure): Guidance for securing cloud infrastructure through strict policies and enforcement strategies.
3030

31-
- [Network](/security/zero-trust/deploy/networks): Guidance for securing your cloud network through segmentation, traffic inspection, and end-to-end encryption.
31+
- [Networks](/security/zero-trust/deploy/networks): Guidance for securing your cloud network through segmentation, traffic inspection, and end-to-end encryption.
3232

3333
- [Visibility, automation, and orchestration](/security/zero-trust/deploy/visibility-automation-orchestration): Guidance for operational policies and practices that help enforce Zero Trust principles.
3434

learn-pr/azure/cloud-adoption-framework-security/includes/6-ready.md

Lines changed: 12 additions & 10 deletions
Original file line numberDiff line numberDiff line change
@@ -42,31 +42,33 @@ To [help secure data by default](/azure/cloud-adoption-framework/secure/ready#pr
4242
- **Multifactor authentication (MFA):** Add an extra layer of security.
4343
- **Conditional access controls:** Enforce policies based on specific conditions, such as geography or MFA requirements. Ensure that your IAM platform supports these controls.
4444

45-
Microsoft Entra Conditional Access is the Microsoft Zero Trust policy engine. It evaluates signals from various sources to make informed policy decisions.
45+
### Azure facilitation
46+
47+
[Microsoft Entra Conditional Access](/entra/identity/conditional-access/overview) is the Microsoft Zero Trust policy engine. It evaluates signals from various sources to make informed policy decisions.
4648

4749
## Prepare for integrity
4850

4951
Ensure that you have [well-governed policies and standards](/azure/cloud-adoption-framework/secure/ready#prepare-for-integrity) for your data and system integrity. Define standards for the following areas.
5052

5153
- **Data management:**
52-
- *Create a framework and sensitivity-label taxonomy* to define data security risk categories. Use this taxonomy to simplify data inventory, policy management, and investigation prioritization.
54+
- Create a framework and sensitivity-label taxonomy to define data security risk categories. Use this taxonomy to simplify data inventory, policy management, and investigation prioritization.
5355

54-
- *Automate data verification and validation processes* to reduce the burden on data engineers and minimize human error.
56+
- Automate data verification and validation processes to reduce the burden on data engineers and minimize human error.
5557

56-
- *Establish and regularly test backup policies* to help ensure that data is backed up, correct, and consistent. Align with your recovery target objective (RTO) and recovery point objective (RPO) targets.
58+
- Establish and regularly test backup policies to help ensure that data is backed up, correct, and consistent. Align with your recovery target objective (RTO) and recovery point objective (RPO) targets.
5759

58-
- *Ensure that your cloud provider encrypts data at rest and data in transit by default.* Verify that services in your workloads support and are configured for strong encryption.
60+
- Ensure that your cloud provider encrypts data at rest and data in transit by default. Verify that services in your workloads support and are configured for strong encryption.
5961

6062
- **System integrity design patterns:**
61-
- *Design a robust security monitoring platform* to detect unauthorized changes.
63+
- Design a robust security monitoring platform to detect unauthorized changes.
6264

63-
- *Use security information and event management (SIEM), security orchestration, automation, and response (SOAR), and threat detection tools* to identify suspicious activities and potential threats.
65+
- Use security information and event management (SIEM), security orchestration, automation, and response (SOAR), and threat detection tools to identify suspicious activities and potential threats.
6466

65-
- *Automate configuration management* to help ensure consistency and reduce human error.
67+
- Automate configuration management to help ensure consistency and reduce human error.
6668

67-
- *Automate patch management* for virtual machines to help ensure regular updates and consistent system versions.
69+
- Automate patch management for virtual machines to help ensure regular updates and consistent system versions.
6870

69-
- *Use infrastructure as code (IaC)* for all deployments. Integrate IaC into your CI/CD pipelines, and apply safe deployment practices.
71+
- Use infrastructure as code (IaC) for all deployments. Integrate IaC into your CI/CD pipelines, and apply safe deployment practices.
7072

7173
### Azure facilitation
7274

learn-pr/azure/cloud-adoption-framework-security/includes/7-adopt.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -95,7 +95,7 @@ Effectively implement and institutionalize encryption and secure access controls
9595

9696
- [Azure confidential computing](/azure/confidential-computing/overview) helps protect data in use with hardware-based trusted implementation environments, which enhances data security even from cloud administrator access.
9797

98-
- [Microsoft Entra ID](/entra/fundamentals/whatis) provides identity and access management with multifactor authentication (MFA), conditional access, and single sign-on.
98+
- [Microsoft Entra ID](/entra/fundamentals/whatis) provides identity and access management with MFA, conditional access, and single sign-on.
9999

100100
- [Microsoft Entra ID Protection](/entra/id-protection/overview-identity-protection) uses machine learning to identify sign-in risks and unusual behavior, which prevents identity compromise and credential theft.
101101

@@ -149,7 +149,7 @@ Focus on establishing and codifying operational practices that [support availabi
149149
- [Azure Policy](/azure/governance/policy/overview) is a policy management solution that helps enforce organizational standards and assess compliance at scale.
150150

151151
- [Defender for Cloud](/azure/defender-for-cloud/security-policy-concept) provides security policies that can automate compliance with your security standards.
152-
- Azure [built-in recovery capabilities](/reliability/overview-reliability-guidance) support operational continuity and disaster recovery plans.
152+
- Azure [built-in recovery capabilities](/azure/reliability/overview-reliability-guidance) support operational continuity and disaster recovery plans.
153153

154154
## Adopt security sustainment
155155

learn-pr/azure/cloud-adoption-framework-security/includes/8-govern.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -17,7 +17,7 @@ Cloud technology provides on-demand visibility into your [security posture](/azu
1717

1818
- [Microsoft Defender for Cloud](/azure/defender-for-cloud/defender-for-cloud-introduction) can help you continuously discover and automatically manage virtual machines in your environment through automatic data collection provisioning.
1919

20-
- [Defender for Cloud Apps](/defender-cloud-apps/what-is-defender-for-cloud-apps) can help you continuously discover and govern software as a service (SaaS) apps in your environments.
20+
- [Microsoft Defender for Cloud Apps](/defender-cloud-apps/what-is-defender-for-cloud-apps) can help you continuously discover and govern software as a service (SaaS) apps in your environments.
2121

2222
## Govern incident preparedness and response
2323

learn-pr/azure/cloud-adoption-framework-security/includes/9-manage.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -8,10 +8,10 @@ The Manage phase focuses on the ongoing operation of your cloud estate. You must
88

99
Ensure that your observability platform includes thorough monitoring and intelligent alerting. To modernize this platform, adopt a proactive mindset and Zero Trust principles.
1010

11-
- **Assume a breach** in your systems to drive threat hunting and detection engineering. Threat hunting uses a hypothesis-based approach to analyze systems for potential breaches. Detection engineering develops specialized mechanisms to enhance observability platforms for detecting new cyberattacks.
12-
1311
- **Verify explicitly.** Shift from "trust by default" to "trust by exception" by validating trusted activities through visibility. Enhance your observability platform with intelligent identity and access monitoring to detect anomalous behavior in real-time.
1412

13+
- **Assume a breach** in your systems to drive threat hunting and detection engineering. Threat hunting uses a hypothesis-based approach to analyze systems for potential breaches. Detection engineering develops specialized mechanisms to enhance observability platforms for detecting new cyberattacks.
14+
1515
### Azure facilitation
1616

1717
[Defender XDR](/defender-xdr/m365d-enable) provides advanced threat hunting across multiple domains, like endpoints, cloud apps, and identity.

learn-pr/azure/cloud-adoption-framework-security/index.yml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -14,7 +14,7 @@ title: Prepare for cloud security by using the Microsoft Cloud Adoption Framewor
1414
summary: |
1515
Organizations that move to the cloud often find that they need to modernize security practices and tooling to keep up with continuous changes in cloud platforms, business requirements, and security threats.
1616
17-
The Cloud Adoption Framework for Azure consists of eight methodologies. This module focuses on the Secure methodology, which provides guidance for the security modernization journey. It includes processes, best practices, models, and experiences. This guidance adheres to the [Zero Trust principles](https://www.microsoft.com/security/business/zero-trust) and the [CIA Triad principles](/azure/cloud-adoption-framework/secure/overview#the-cia-triad).
17+
The Cloud Adoption Framework for Azure consists of eight methodologies. This module focuses on the Secure methodology, which provides guidance for the security modernization journey.
1818
abstract: |
1919
In this module, you'll learn:
2020
- The key aspects of the Secure methodology in the Cloud Adoption Framework.

0 commit comments

Comments
 (0)